@article{oai:muroran-it.repo.nii.ac.jp:00009491, author = {ZHANG, Lei and WEI, Lifei and HUANG, Dongmei and ZHANG, Kai and DONG, Mianxiong and 董, 冕雄 and OTA, Kaoru and 太田, 香}, issue = {16}, journal = {Security and Communication Networks}, month = {May}, note = {application/pdf, Since the technology of mobile cloud computing has brought a lot of benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storage limitation, data owners would like to upload and further share the data through the cloud. Due to the safety requirements, mobile data owners are requested to provide credentials such as authentication tags along with the data. However, it is impossible to require mobile data owners to provide every authenticated computational results. The solution that signers’ privilege is outsourced to the cloud would be a promising way. To solve this problem, we propose three secure multi-entities delegated authentication protocols (MEDAPs) in mobile cloud computing, which enables the multiple mobile data owners to authorize a group designated cloud servers with the signing rights. The security of MEDAPs is constructed on three cryptographic primitive identity-based multi-proxy signature (IBMPS), identity-based proxy multi-signature (IBPMS), and identity-based multi-proxy multi-signature (IBMPMS), relied on the cubic residues, equaling to the integer factorization assumption. We also give the formal security proof under adaptively chosen message attacks and chosen identity/warrant attacks. Furthermore,compared with the pairing based protocol, MEDAPs are quite efficient and the communication overhead is nearly not a linear growth with the number of cloud servers. Copyright⃝c 2015 John Wiley & Sons, Ltd.}, pages = {3777--3789}, title = {MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing}, volume = {9}, year = {2016}, yomi = {トウ, メンユウ and オオタ, カオル} }